Professional Documents
Culture Documents
S-87-13-III (Comp. Sci. & App.) PDF
S-87-13-III (Comp. Sci. & App.) PDF
13. If an artificial variable is present in 17. A regular grammar for the language
the ‘basic variable’ of optimal L = {anbm | n is even and m is
simplex table then the solution is even}is given by
______ (A) S→aSb | S1; S1 → bS1a | λ
(A) Alternative solution
(B) S→aaS | S1; S1 → bSb | λ
(B) Infeasible solution
(C) Unbounded solution (C) S→aSb | S1; S1 → S1ab | λ
(D) Degenerate solution (D) S→aaS | S1; S1 → bbS1 | λ
S-87-13 3 Paper-III
18. Given the following productions of a 21. Assume statements S1 and S2 defined
grammar : as :
S→ aA| aBB; S1 : L2-L1 is recursive enumerable
A→aaA |λ ; where L1 and L2 are recursive
B→ bB| bbC; and recursive enumerable
C→ B respectively.
Which of the following is true ? S2 : The set of all Turing machines
(A) The language corresponding to
is countable.
the given grammar is a set of
even number of a’s. Which of the following is true ?
(B) The language corresponding to (A) S1 is correct and S2 is not
the given grammar is a set of correct.
odd number of a’s. (B) Both S1 and S2 are correct.
(C) The language corresponding to
the given grammar is a set of (C) Both S1 and S2 are not correct.
even number of a’s followed by (D) S1 is not correct and S2 is
odd number of b’s. correct.
(D) The language corresponding to
the given grammar is a set of 22. Non-deterministic pushdown automaton
odd number of a’s followed by that accepts the language generated by
even number of b’s. the grammar: S→aSS | ab is
(A) δ(q0, λ, z) = { (q1, z)};
19. The language accepted by the non-
deterministic pushdown automaton δ(q0, a, S) = { (q1, SS)}, (q1, B) }
M= ({q0, q1, q2}, {a, b}, {a, b, z}, δ, δ(q0, b, B) = { (q1, λ)},
q0, z, {q2}) with transitions δ(q1, λ, z) = { (qf, λ)}
δ (q0 a, z) = { (q1 a), (q2 λ)};
(B) δ(q0, λ, z) = { (q1, Sz)};
δ (q1, b, a) = { (q1, b)}
δ(q0, a, S) = { (q1, SS)}, (q1, B) }
δ (q1, b, b) ={ (q1 b)}, δ (q1, a, b) =
δ(q0, b, B) = { (q1, λ)},
{ (q2, λ)}
δ(q1, λ, z) = { (qf, λ)}
is
(A) L(abb*a) (C) δ(q0, λ, z) = { (q1, Sz)};
(B) {a} U L(abb*a)
δ(q0, a, S) = { (q1, S)}, (q1, B) }
(C) L(ab*a)
(D) {a} U L(ab*a) δ(q0, b, λ) = { (q1, B)},
δ(q1, λ, z) = { (qf, λ)}
20. The language L = | n ≥ 0,
{an bn am bm
m ≥ 0} is (D) δ(q0, λ, z) = { (q1, z)};
(A) Context free but not linear δ(q0, a, S) = { (q1, SS)}, (q1, B) }
(B) Context free and linear
δ(q0, b, λ) = { (q1, B)},
(C) Not Context free and not linear
(D) Not Context free but linear δ(q1, λ, z) = { (qf, λ)}
Paper-III 4 S-87-13
23. Match the following : 26. Let A be the set of comfortable
(a) Dangling (i) Buffer houses given as
pointer replacement ⎧ x1 x2 x3 x4 ⎫
A = ⎨0.8, 0.9, 0.1, 0.7⎬
policy ⎩ ⎭
(b) Page fault (ii) Variable- and B be the set of affordable houses
length ⎧ x1 x2 x3 x4 ⎫
records B = ⎨0.9, 0.8, 0.6, 0.2⎬
⎩ ⎭
(c) List (iii) Object Then the set of comfortable and
representation identifier affordable houses is
(d) Toss- (iv) Pointer-
⎧ x1 x2 x3 x4 ⎫
immediate swizzling (A) ⎨0.8, 0.8, 0.1, 0.2⎬
Codes : ⎩ ⎭
(a) (b) (c) (d) ⎧ x1 x2 x3 x4 ⎫
(B) ⎨0.9, 0.9, 0.6, 0.7⎬
(A) (iii) (iv) (ii) (i) ⎩ ⎭
(B) (iv) (iii) (ii) (i) ⎧ x1 x2 x3 x4 ⎫
(C) (iv) (iii) (i) (ii) (C) ⎨0.8, 0.8, 0.6, 0.7⎬
⎩ ⎭
(D) (iii) (iv) (i) (ii)
⎧ x1 x2 x3 x4 ⎫
(D) ⎨0.7, 0.7, 0.7, 0.9⎬
24. _______ constraints ensure that a ⎩ ⎭
value that appears in one relation for
a given set of attributes also appears 27. Support of a fuzzy set
for a certain set of attributes in ⎧ x1 x2 x3 x4 x5 ⎫
A = ⎨0.2, 0.15, 0.9, 0.95, 0.15⎬
another relation. ⎩ ⎭
(A) Logical Integrity within a universal set X is given as
(B) Referential Integrity ⎧ x1 x2 x3 x4 x5 ⎫
(C) Domain Integrity (A) ⎨0.15, 0.15, 0.15, 0.15, 0.15⎬
⎩ ⎭
(D) Data Integrity
⎧ x1 x2 x3 x4 x5 ⎫
(B) ⎨0.95, 0.95, 0.95, 0.95, 0.95⎬
25. The SQL expression ⎩ ⎭
Select distinct T, branch_name from (C) {x3, x4}
branch T, branch S (D) {x1, x2, x3, x4, x5}
where T.assets>S.assets and
S.branch_city=”Mumbai” finds the 28. In a single perceptron, the updation
names of rule of weight vector is given by
(A) All branches that have greater (A) w(n + 1)=w(n)+η[d(n)-y(n)]
assets than some branch (B) w(n + 1)=w(n)–η[d(n)-y(n)]
located in Mumbai.
(C) w(n + 1)=w(n)+η[d(n)-y(n)]* x (n)
(B) All branches that have greater (D) w(n + 1)=w(n)–η[d(n)-y(n)]* x (n)
assets than all branches in
Mumbai. 29. ______ refers to the discrepancy
(C) The branch that has greatest among a computed, observed or
asset in Mumbai. measured value and the true specified
(D) Any branch that has greater or theoretically correct values.
assets than any branch in (A) Fault (B) Failure
Mumbai. (C) Defect (D) Error
S-87-13 5 Paper-III
30. Which logic family dissipates the 36. A binary ripple counter is required to
minimum power ? count up to 16383. How many flip-
(A) DTL (B) TTL flops are required ?
(C) ECL (D) CMOS (A) 16382 (B) 8191
(C) 512 (D) 14
31. Which of the following electronic
component is not found in IC’s ? 37. The time complexity of recurrence
relation
(A) Diode (B) Resistor
T(n) = T(n/3) + T(2n/3) + O(n) is
(C) Transistor (D) Inductor
(A) O(Ig n) (B) O(n)
(C) O(n Ig n) (D) O(n2 )
32. A given memory chip has 14 address
pins and 8 data pins. It has the 38. How many people must there be in a
following number of locations. room before there is a 50% chance
(A) 28 (B) 214 that two of them were born on the
(C) 26 (D) 212 same day of the year ?
(A) At least 23 (B) At least 183
33. The instruction: MOV CL, [BX] [DI] (C) At least 366 (D) At least 730
+ 8 represents the _____ addressing
mode. 39. The number of possible
(A) Based Relative parenthesizations of a sequence of n
(B) Based Indexed matrices is
(C) Indexed Relative (A) O(n)
(D) Register Indexed (B) θ(n Ig n)
(C) Ω(2n)
(D) None of the above
34. The power dissipation of a flip-flop
is 3 mW. The power dissipation of a
40. The time complexity of an efficient
digital system with 4 flip-flops is
algorithm to find the longest
given by
monotonically increasing
(A) 34 mW (B) 43 mW subsequence of n numbers is
(C) 4/3 mW (D) 12 mW (A) O(n)
(B) O(n Ig n)
35. An astable multivibrator using the (C) O(n2)
555 timer to generate a square wave (D) None of the above
of 5 KHz with 70% duty cycle will
have 41. Given a binary search trees for a set
(A) RA = 40.4 KΩ, RB = 17.25 KΩ, of n=5 keys with the following
C = 2000 pF probabilities :
(B) RA = 17.25 KΩ, RB = 40.4 KΩ, i 0 1 2 3 4 5
C = 2000 pF pi – 0.15 0.10 0.05 0.10 0.20
(C) RA = 40.4 KΩ, RB = 17.25 KΩ, qi 0.05 0.10 0.05 0.05 0.05 0.10
C = 5000 pF The expected optimal cost of the
(D) RA = 17.25 KΩ, RB = 40.4 KΩ, search is
(A) 2.65 (B) 2.70
C = 5000 pF (C) 2.75 (D) 2.80
Paper-III 6 S-87-13
42. Given 0-1 knapsack problem and 45. Improving processing efficiency or
fractional knapsack problem and the performance or restructuring of software
following statements : to improve changeability is known as
S1 : 0-1 knapsack is efficiently (A) Corrective maintenance
(B) Perfective maintenance
solved using Greedy algorithm. (C) Adaptive maintenance
S2 : Fractional knapsack is (D) Code maintenance
efficiently solved using 46. In ____,modules A and B make use
Dynamic programming. of a common data type, but perhaps
Which of the following is true ? perform different operations on it.
(A) S1 is correct and S2 is not correct. (A) Data coupling
(B) Both S1 and S2 are correct. (B) Stamp coupling
(C) Control coupling
(C) Both S1 and S2 are not correct. (D) Content coupling
(D) S1 is not correct and S2 is correct. 47. Consider the following schemas :
43. Equivalence class partitioning Branch_Schema = (branch_name, assets,
approach is used to divide the input city)
domain into a set of equivalence Customer_Schema = (cutstomer_name,
classes, so that if a program works street, city)
correctly for a value, then it will Deposit_Schema = (branch_name,
work correctly for all the other values account_number, customer_name,
in that class. This is used _____. balance)
(A) to partition the program in the Borrow_Schema = (branch_name,
form of classes. loan_number, customer_name, amount)
(B) to reduce the number of test Which of the following tuple
cases required. relational calculus finds all customers
(C) for designing test cases in who have loan amount more than
white box testing. ` 12,000 ?
(D) all of the above. (A) {t(customer_name) | t∈borrow[?]
44. The failure intensity for a basic model t[amount]>12000}
as a function of failures experienced is (B) {t |t(customer_name) |
given as λ(μ)-λ0[1 – (μ)/(V0)] t∈borrow[?] t[amount]>12000}
where λ0 is the initial failure intensity (C) {t |[?] ∈ borrow
(t(customer_name=s(customer_
at the start of the execution, μ is the name))[?] [amount]>12000}
average or expected number of failures (D) {t |[?] ∈ borrow
at a given point in time, the quantity (t(customer_name)[?] s[amount]
V0 is the total number of failures that
>12000}
would occur in infinite time. 48. Match the following :
Assume that a program will experience (a) Create (i) The E-R Model
100 failures in infinite time, the initial (b) Select (ii) Relationship Model
failure intensity was 10 failures/CPU (c) Rectangle (iii) DDL
hr. Then the decrement of failures (d) Record (iv) DML
intensity per failure will be Codes :
(a) (b) (c) (d)
(A) 10 per CPU hr. (A) (iii) (iv) (i) (ii)
(B) 0.1 per CPU hr. (B) (iv) (iii) (ii) (i)
(C) –0.1 per CPU hr. (C) (iv) (iii) (i) (ii)
(D) 90 per CPU hr. (D) (iii) (iv) (ii) (i)
S-87-13 7 Paper-III
49. Match the following : 52. Assume that we have constructor
(i) One to one function for both Base and Derived
relationship classes. Now consider the declaration :
(a) main ( )
(ii) Relationship Base *p = new Derived;
(b) In what sequence, the constructor
will be executed ?
(iii) Many to many
(c) (A) Derived class constructor is
relationship
followed by Base class
(iv) Many to one constructor.
(d) relationship (B) Base class constructor is
followed by Derived class
Codes : constructor.
(a) (b) (c) (d) (C) Base class constructor is never
(A) (iii) (iv) (ii) (i) called.
(D) Derived class constructor is
(B) (iv) (iii) (ii) (i)
never called.
(C) (ii) (iii) (iv) (i)
(D) (iii) (iv) (i) (ii) 53. What is the output of the following
program ?
50. Sixty (60) reusable components were
#include<stdio.h>
available for an application. If only
main( )
70% of these components can be used,
rest 30% would have to be developed {
from scratch. If average component is int a, b = 0;
100 LOC and cost of each LOC is static int c[10] =
` 14, what will be the risk exposure if {1, 2, 3, 4, 5, 6, 7, 8, 9, 0};
risk probability is 80% ? for (a=0; a<10;++a);
(A) ` 25,200 (B) ` 20,160 if ((c[a]%2)= =0) b+=c[a];
(C) ` 25,160 (D) ` 20,400 printf(“%d”,b);
}
51. Consider the following two function (A) 15 (B) 25
declarations : (C) 45 (D) 20
(i) int *f( ) (ii) int (*f)( )
54. A Program contains the following
Which of the following is true ? declarations and initial assignments
(A) Both are identical. int i = 8, j = 5;
(B) The first is a correct declaration double x = 0.005, y = –0.01;
and the second is wrong. char c=’c’, d=’d’;
(C) Both are different ways of Determine the value of the following
declaring pointer to a function. expressions which involve the use of
library functions:
(D) The first declaration is a
function returning a pointer to abs(i-2*j) ; log(exp(x)) ;
an integer and the second is a toupper(d)
pointer to function returning (A) 2; 0.005; D (B) 1; 0.005; D
integer. (C) 2; 0.005; E (D) 1; 0.005; e
Paper-III 8 S-87-13
55. MPEG involves both spatial 61. Which of the following is/are
compression and temporal fundamental method(s) of
compression. The spatial antialiasing ?
compression is similar to JPEG and
temporal compression removes (i) Increase of sample rate.
______ frames. (ii) Treating a pixel as a finite area
(A) Temporal (B) Voice rather than as a point.
(C) Spatial (D) Redundant (iii) Decrease of sample rate.
56. If the data unit is 111111 and the (A) (i) and (ii) (B) (ii) and (iii)
divisor is 1010. In CRC method, (C) (i) only (D) (ii) only
what is the dividend at the
transmission before division ?
(A) 1111110000 (B) 1111111010 62. The two color systems – the HSV
(C) 111111000 (D) 111111 and HLS are
57. If user A wants to send an encrypted (A) Hue, Saturation, Value and
message to user B. The plain text of A is Hue, Lightness, Saturation.
encrypted with the _______. (B) High, Standard, Value and
(A) Public Key of user A High, Lightness, Saturation.
(B) Public Key of user B
(C) Private Key of user A (C) Highly, Saturated, Value and
(D) Private Key of user B Highly, Lightened, Saturation.
58. A _____ can forward or block (D) Highly, Standard, Value and
packets based on the information in Hue, Lightness, Saturation.
the network layer and transport layer
header. 63. The parametric representation of the
(A) Proxy firewall line segment between the position
(B) Firewall
(C) Packet filter firewall vectors P1(2, 3) and P2(5, 4) is given as
(D) Message digest firewall (A) x(t)= 2+7t, y(t) = 0≤t≤∝
59. Which of the following graphics 3+7t
devices are known as active graphics (B) x(t)=2+10t, y(t) = 0≤t≤1
devices ? 3+12t
(i) Alphanumeric devices
(ii) Thumb wheels (C) x(t)= 2+3t, 0≤t≤1
(iii) Digitizers y(t)=3+t
(iv) Joystics (D) t(x, y) = 14t 0≤t≤1
(A) (i) and (ii)
(B) (iii) and (iv)
(C) (i), (ii) and (iii) 64. Consider the following
(D) (i), (ii), (iii) and (iv) transformation matrix for
60. A diametric projection is said to be rotation(clockwise) :
trimetric projection when ⎡ –sinθ
cosθ sinθ 0 0
⎤
(i) two of the three foreshortening
[T] =
⎢ cosθ 0 0 ⎥
factors are equal and third is
⎢ 0 0 1 0 ⎥
arbitrary.
(ii) all of the three foreshortening ⎣ 0 0 0 1 ⎦
factors are equal. This matrix rotates an object by an
(iii) all of the three foreshortening angle θ about :
factors are arbitrary. (A) X-axis
Which of the above is true ? (B) Y-axis
(A) (i) and (ii) (B) (ii) and (iii) (C) Z-axis
(C) (i) only (D) (iii) only (D) All of the above
S-87-13 9 Paper-III
65. Consider the following sequence of 68. Which of the following statements is
operations : not correct with reference to
distributed systems ?
(i) Pointer p1 is set to point at a (A) Distributed system represents a
new heap-dynamic variable. global view of the network and
(ii) Pointer p2 is assigned p1’s considers it as a virtual uni-
processor system by controlling
value. and managing resources across
(iii) The heap dynamic variable the network on all the sites.
pointed to by p1 is explicitly (B) Distributed system is built on
bare machine, not an add-on to
de-allocated, but p2 is not the existing software.
changed by the operation. (C) In a distributed system, kernel
This situation leads to which of the provides smallest possible set
of services on which other
following : services are built. This kernel is
(A) p1 becomes a dangling pointer called microkernel. Open
servers provide other services
(B) p2 becomes a dangling pointer and access to shared resources.
(C) Both p1 and p2 are now (D) In a distributed system, if a
dangling pointers user wants to run the program
on other nodes or share the
(D) Neither p1 nor p2 is now a resources on remote sites due
dangling pointer to their beneficial aspects, user
has to log on to that site.
69. A system contains 10 units of
66. The programming languages C and resource of same type. The resource
C++ are not strongly typed languages requirement and current allocation of
because : these resources for three processes P,
Q and R are as follows :
(A) Both C and C++ allow P Q R
functions for which parameters Maximum requirement 8 7 5
are not type checked. Current allocation 4 1 3
(B) Both C and C++ allow Now, consider the following resource
requests :
functions for which parameters (i) P makes a request for 2 resource units.
are type checked. (ii) Q makes request for 2 resources units.
(C) Both C and C++ allow (iii) R makes a request of 2 resource units.
For a safe state, which of the
functions for which parameters following options must be satisfied ?
are not type checked and also (A) Only request (i)
the union types in these (B) Only request (ii)
languages are not type checked. (C) Only request (iii)
(D) Request (i) and (ii)
(D) Union types in these (C and 70. Consider the following set of
C++) languages are not type processes with the length of CPU
checked. burst time in milliseconds (ms) :
Process A B C D E
Burst time 6 1 2 1 5
67. The tracing model in Prolog Priority 3 1 3 4 2
describes program execution in terms Assume that processes are stored in
of certain events. These events are ready queue in following order :
A–B–C–D–E
(A) call and exit Using round robin scheduling with
(B) call and fail time slice of 1 ms, the average turn
around time is
(C) call, exit and redo (A) 8.4 ms (B) 12.4 ms
(D) call, exit, redo and fail (C) 9.2 ms (D) 9.4 ms
Paper-III 10 S-87-13
71. Consider a main memory with 3 page 75. Which of the following statements is
frames for the following page
reference string : not true for UNIX Operating System ?
5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4
Assuming that the execution of
process is initiated after loading page
5 in memory, the number of page (A) Major strength of UNIX
faults in FIFO and second chance
replacement respectively are Operating System is its open
(A) 8 and 9 (B) 10 and 11
(C) 7 and 9 (D) 9 and 8 standards which enabled large
72. Which of the following shell scripts will number of organizations
produce the output “my first script” ?
(A) for i in my first script { echo –i $i} ranging from academicia to
(B) for my first script; do echo –n; done
(C) for i in my first script; do echo industries to participate in its
–i $i; done
(D) for n in my first script; do echo development.
–i $i; done
73. The portion of Windows 2000 operating
system which is not portable is
(A) processor management (B) UNIX kernel uses modules
(B) user interface
(C) device management with well specified interfaces
(D) virtual memory management
and provides advantages like
74. Match the following for Windows
Operating System : simplified testing and
(a) Hard- (i) Starting all processes,
ware emulation of different maintenance of kernel. It has
abstra- operating systems,
ction security functions, better extensibility as the
layer transform character
based applications to kernel is not monolithic.
graphical
representation.
(b) Kernel (ii) Export a virtual
memory interface, (C) UNIX is kernel based operating
support for symmetric
multiprocessing, system with two main
administration, details
of mapping memory, components viz. process
configuring I/O buses,
setting up DMA. management subsystem and
(c) Exe- (iii) Thread scheduling,
cutive interrupt and exception file management subsystem.
handling, recovery
after power failure.
(d) Win32 (iv) Object manager, virtual (D) All devices are represented as
sub- memory manager,
system process manager, plug- files which simplify the
and-play and power
manager. management of I/O devices and
Codes :
(a) (b) (c) (d) files. The directories structure
(A) (i) (iii) (ii) (iv)
(B) (iv) (iii) (ii) (i) used is directed acyclic graph.
(C) (ii) (iii) (iv) (i)
(D) (iii) (ii) (i) (iv)
S-87-13 11 Paper-III
Space For Rough Work
Paper-III 12 S-87-13